#DigitalRights from an end point of view? N.S.A. Devises Radio Pathway Into Computers

Posted on January 15, 2014


As I was reading the post on “N.S.A Devises Radio Pathway into Computers” one thought that keeps coming up each time when I read about the mass surveillance, we as innocent users of the Internet and devices have no digital privacy rights nor do we have “protection rights” nor safety rights in many of our countries, when it comes to our end point rights as users of technology communication devices. Again, I am speaking mainly from an end point of view as users of various technology and Internet. As a digital activist or if you are activists globally we don’t have any digital rights one needs to realize this as we use technology tools and none of these Internet Technology Companies protect our data digital rights activism Activists speaking or communicating through various devices in their countries in general don’t have any safety or protection digital rights, when it comes to their/our information and data. I found many of my social media friends & connections don’t give a rat’s ass when it comes to their “digital privacy rights” only a small percentage who care will post an occasional comment, unless you join advocacy groups such as Fight for the Future

You may be wondering how to protect your data & information well I believe there is a solution!..talk to me and I will direct you how some of the technology companies are solving this problem. I am working with a few technologists to help me solve this for innocent children, women and activists who are now at risk as we bridge the digital divide.
If you reading my post, you must have read about the mass surveillance program revealed by documents leaked by former security contractor Edward Snowden last summer, reports about the NSA’s surveillance methods have followed, including one that alleges the agency placed spyware on consumer electronics made by Microsoft, Cisco and other major brands read more: NSA Reportedly Put Spyware on Consumer Tech Products

In the case of how easy it is for anyone to buy data catch this writeup that caught my attention:
Digital rights activist buys data of 1.1 million Facebook users for $5
“Bogomil Shopova recently purchased a collection of 1.1 million Facebook users’ names, IDs and e-mail accounts. Fortunately, the Bulgarian blogger and digital rights activist has no intentions of spamming the list or hacking into accounts- he did it to prove a point. That point, of course, was to highlight how easy it is to gather personal information from the social networking site” read more
Your information

United Nations DigitalAge Privacy @mymulticast

United Nations DigitalAge Privacy @mymulticast

I believe cyber security will play a major role in the coming future when it comes to technology, new media sector and human rights issues and it will be in the forefront. On Friday, January 17, 2014 President Obama will announce the results of his review of National Security Agency surveillance programs, according to a post on Amnesty’s blog site, the author states” will he renounce mass surveillance and put human rights at the heart of reform? Or will he perpetuate a global spying program that puts free speech and privacy rights of people around the world at risk”?

#snowden @mymulticast

#snowden @mymulticast

N.S.A. Devises Radio Pathway Into Computers
The agency has put software in thousands of computers that allows for surveillance and can also create a path for launching cyber attacks, according to documents, experts and officials.

WASHINGTON — The National Security Agency has implanted software in nearly 100,000 computers around the world that allows the United States to conduct surveillance on those machines and can also create a digital highway for launching #cyberattacks.

While most of the software is inserted by gaining access to computer networks, the N.S.A. has increasingly made use of a secret technology that enables it to enter and alter data in computers even if they are not connected to the Internet, according to N.S.A. documents, computer experts and American officials.

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.
The radio frequency technology has helped solve one of the biggest problems facing American intelligence agencies for years: getting into computers that adversaries, and some American partners, have tried to make impervious to spying or cyber attack. In most cases, the radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user.

The N.S.A. calls its efforts more an act of “active defense” against foreign cyber attacks than a tool to go on the offensive. But when Chinese attackers place similar software on the computer systems of American companies or government agencies, American officials have protested, often at the presidential level.
Catch the full post on
The New York Times NSA Devises Radio Pathway Into Computers

The N.S.A.’s Evolution N.S.A Evolution